Skip to main content

Open key exchange: How to defeat dictionary attacks without encrypting public keys

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1361))

Abstract

Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] proposed “encrypted key exchange” (EKE) protocols, to frustrate key-guessing attacks. EKE requires the use of asymmetric cryptosystems and is based on encrypting the public key, using a symmetric cipher.

In this paper, a novel way of key exchange is presented, where public keys are sent openly, not encrypted. In contrast to EKE protocols, the same public-key/secret-key pair can be used for arbitrary many protocol executions. The RSA-based protocol variant is found to be quite efficient and practical.

Compared to previous work on such protocols, a more solid formal treatment is given, influenced by the work of Bellare and Rogaway [3] on key exchange protocols for strong common secrets.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, M. Lomas, “Fortifying Key Negotiation Schemes with Poorly Chosen Passwords”, Electronics Letters, Vol. 30, No. 13, 1994, 1040–1041.

    Article  Google Scholar 

  2. M. Bellare, P. Rogaway, “Random Oracles are Practical: A Paradigm for Designing Efficient Protocols”, First ACM Conference on Computer and Communications Security, ACM, 1993.

    Google Scholar 

  3. M. Bellare, P. Rogaway, “Entity Authentication and Key Distribution”, Crypto '93, Springer LNCS 773.

    Google Scholar 

  4. S. Bellovin, M. Merritt, “Encrypted key exchange: Password-based protocols secure against dictionary attacks”, Proc. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, 1992.

    Google Scholar 

  5. S. Blake-Wilson, A. Menezes, “Security Proofs for Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques”, 1997, these proceedings.

    Google Scholar 

  6. S. Blake-Wilson, private communication.

    Google Scholar 

  7. L. Gong, M. Lomas, R. Needham, J. Salzer, “Protecting Poorly Chosen Secrets from Guessing Attacks”, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, 648–656.

    Article  Google Scholar 

  8. L. Gong, “Optimal Authentication Protocols Resistant to Password Guessing Attacks”, Proceedings of the 8th IEEE Computer Security Foundations Workshop, 1995, 24–29.

    Google Scholar 

  9. D..Jablon, “Strong Password-Only Authenticated Key Exchange”, ACM Computer Communications Review, October 1996.

    Google Scholar 

  10. D. Jablon, private communication.

    Google Scholar 

  11. S. Patel, “Information Leakage in Encrypted Key Exchange”, manuscript.

    Google Scholar 

  12. B. Schneier “Applied Cryptography” (2nd ed.), Wiley, 1996.

    Google Scholar 

  13. M. Steiner, G. Tsudik, M. Waidner, “Refinement and Extension of Encrypted Key Exchange”, Operating Systems Review, Vol. 29, No. 3, 22–30.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bruce Christianson Bruno Crispo Mark Lomas Michael Roe

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lucks, S. (1998). Open key exchange: How to defeat dictionary attacks without encrypting public keys. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028161

Download citation

  • DOI: https://doi.org/10.1007/BFb0028161

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64040-0

  • Online ISBN: 978-3-540-69688-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics